General

  • Target

    24148fc69ca00c07a624ddb079f1e9f211ad2e6fd449cf8dc24441b4847f8da5

  • Size

    376KB

  • Sample

    230504-zrl3vafb79

  • MD5

    47014ad64a72471cbe3582993f2dcd47

  • SHA1

    7312e5d4e348013c8a43a137bd517d4ad15e9f73

  • SHA256

    24148fc69ca00c07a624ddb079f1e9f211ad2e6fd449cf8dc24441b4847f8da5

  • SHA512

    4fffb1c64efd86327773c7909e224ddf2d1790eb7e62e11fcfcf305ab7f1f319227f033a686d1f0c5b17b1b1d9ff2a58a5587797e30d21b26c74ef83812dc0a9

  • SSDEEP

    6144:KGy+bnr+pp0yN90QEUsabCFbOLe/Vz7iSnZ/oE6MI+WawE2APYWmVCQ1s2UC2dx:WMrNy90seFbfVz7ikZ56MTrwEn0lWC2n

Malware Config

Targets

    • Target

      24148fc69ca00c07a624ddb079f1e9f211ad2e6fd449cf8dc24441b4847f8da5

    • Size

      376KB

    • MD5

      47014ad64a72471cbe3582993f2dcd47

    • SHA1

      7312e5d4e348013c8a43a137bd517d4ad15e9f73

    • SHA256

      24148fc69ca00c07a624ddb079f1e9f211ad2e6fd449cf8dc24441b4847f8da5

    • SHA512

      4fffb1c64efd86327773c7909e224ddf2d1790eb7e62e11fcfcf305ab7f1f319227f033a686d1f0c5b17b1b1d9ff2a58a5587797e30d21b26c74ef83812dc0a9

    • SSDEEP

      6144:KGy+bnr+pp0yN90QEUsabCFbOLe/Vz7iSnZ/oE6MI+WawE2APYWmVCQ1s2UC2dx:WMrNy90seFbfVz7ikZ56MTrwEn0lWC2n

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks